Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Hundreds of Cisco switches are affected by a critical zero-day vulnerability found by the vendor during its analysis of WikiLeaks’ Vault 7 files [Read More]
Turkish hackers abuse Twitter Counter app to hijack many high-profile Twitter accounts over the diplomatic dispute between Turkey and the Netherlands [Read More]
Home Depot has agreed to pay banks $25 million as part of a settlement over the 2014 data breach [Read More]
Financially motivated attackers have become just as sophisticated as state-sponsored actors, says FireEye in 2017 M-Trends report [Read More]
Industry professionals comment on the CIA hacking tools detailed by WikiLeaks and the implications of the Vault7 leak [Read More]
CIA responds to WikiLeaks Vault 7 dump: it’s our job to be innovative and cutting-edge, but we don’t spy on fellow Americans [Read More]
Apple and Google are confident that most of the vulnerabilities used by the CIA do not affect the latest versions of their products [Read More]
Verifone is investigating a breach that it has described as "a limited cyber intrusion" into its corporate network." [Read More]
Security firms have started assessing the impact of the CIA hacking tools exposed in the WikiLeaks Vault 7 leak [Read More]
Cloudflare has found no evidence that the Cloudbleed bug has been exploited for malicious purposes before it was patched [Read More]

FEATURES, INSIGHTS // Incident Response

rss icon

Marc Solomon's picture
Companies can make their entire security infrastructure more effective by using this threat intelligence as the glue to integrate layers of point products within a defense-in-depth strategy.
Avi Chesla's picture
Security analysts are collecting all events, but are struggling to filter out non-relevant signals in an attempt to isolate the important events from the rest of the noise.
Marc Solomon's picture
There are strategies you can use so that the risk score is more relevant and useful within your specific environment.
Steven Grossman's picture
While we all dream of solving the skills shortage by completely automating the entire detection and response process, it is simply unlikely to happen in the foreseeable future.
Scott Simkin's picture
Threat intelligence can play an important role in improving an organization’s overall cybersecurity posture, provided the right case is made and the right processes are put in place.
Lance Cottrell's picture
When properly integrated, detection, response, and prevention reinforce each other, each making the other more effective.
Joshua Goldfarb's picture
It’s time to bring the capability to achieve a mature security posture through a robust security operations function to the masses.
Adam Meyer's picture
At the end of the day, whatever your cyber threat intelligence plan and process is, it should drive faster and smarter decisions that minimize your risk exposure.
Ashley Arbuckle's picture
There’s a lot organizations can do to strengthen their incident response capabilities so that they’re up to the test. Here are a few ways to take charge and ensure a better outcome...
Joshua Goldfarb's picture
Defenders must think more broadly about the risk they're trying to mitigate, rather than getting distracted and instituting one-off policies and solutions to new means that may arise.